Cydalics CYDALICS

About Cydalics

Built by senior
practitioners.
Shaped by sovereignty.

Cydalics helps organisations see and control risks that sit outside the reach of traditional IT and cybersecurity tools — in complex communications, radio and satellite signals, connected devices, and AI-powered agentic workflows.

A former CISO and a security-industry veteran — 50+ years across both sides of the security industry.

Why we exist

Modern operations have moved beyond the office network.

They run across wireless and radio signals, satellite navigation, connected devices and sites, automated and AI-driven workflows, and a long chain of third-party dependencies. Existing safeguards remain essential — but they were not built to see what's happening in radio signals, agent behaviour, or cross-system data flows.

Wireless & radio signals

Wi-Fi, cellular, Bluetooth, drones, GPS-style satellite navigation.

Connected devices & sites

Sensors, machinery, vehicles, building systems.

Automated & AI-driven workflows

Software agents that act, move data, and decide.

Third-party dependencies

Suppliers, cloud services, external data sources.

That is the gap Cydalics closes.

The team

Senior practitioners. Both sides of the table.

The team that has been on the receiving end of cybersecurity decisions, and the team that has built the products those decisions depend on. The same people, in one company.

Co-Founder & CEO

Over 25 years of cybersecurity experience across military, telecommunications, software, and infrastructure. Former innovation lead at one of Australia's largest telecommunications companies. Based in Queensland, Australia.

Co-Founder & COO

Over 25 years in cybersecurity consulting, IT and OT security operations, risk management, and security audits. Former acting CISO for a major Australian energy company. CISO for two major Swiss banks. Based in Switzerland.

Chief AI Officer

Nearly 20 years of applied software engineering and data science experience. Leads the analytics and machine-learning engine that powers Cydalics products. Based in Queensland, Australia.

Operations & Risk

Chartered accountant with extensive experience in audit and cybersecurity executive roles, including protecting global consumer-facing digital assets for one of the world's largest food and beverage companies. Based in Switzerland.

Supported by advisors across the United States, Europe, and Asia-Pacific.

Sovereign by design

Australia and Switzerland — the rigour behind the platform.

Cydalics is shaped by the rigorous security, compliance, and regulatory regimes of Australia and Switzerland — both amongst the world's most demanding jurisdictions — and brings that discipline to engagements in-region, including across the Middle East, when local accountability or data-residency rules require it.

Asia-Pacific

Australia

Headquarters, engineering, and Asia-Pacific operations. Brisbane-based with on-the-ground expertise in critical infrastructure, defence, and telecommunications.

Aligned with: Essential Eight · APRA CPS 234 · IRAP context

Europe

Switzerland

European base of operations. Regional support, partnerships across financial services, public sector, and energy markets, and engagement capacity into the Middle East.

Aligned with: ISO 27001 · NIS2 · DORA · NCA ECC · SAMA CSF

Principles

What we stand for.

Your data stays with you.

On-premises, fully offline, and customer-controlled deployments — so your data, models, agents, and operational context never have to leave your control.

Evidence, not opinion.

Every engagement produces defensible findings — what was observed, why it matters, what to do. Suitable for boards, auditors, insurers, and regulators.

Practitioner-led, not vendor-led.

Founded and built by people who have been on both sides of the security industry — CISO leadership, audit, OT operations, and product engineering.

Independent.

Privately held. No conflicting interests. The only obligation is to our customers and the integrity of their environments.

Who we serve

Industries where the new risk hides.

Built for regulated industries, sovereign environments, and sensitive sites.

Critical infrastructure

Energy, utilities, water

Defence & national security

Spectrum, SIGINT, sites

Financial services

Banks, insurance, trading

Public sector

Federal, state, local

Telecommunications

Carriers, towers, spectrum

Healthcare

Hospitals, medical devices

Industrial & OT

Manufacturing, mining, energy

Maritime & logistics

Vessels, ports, airports

Want to learn more?

Tell us where the hidden risk sits in your environment, and we'll suggest the right next step.

Request a Demo Talk to us